Write a Blog >>
Events (39 results)

All Your App Links Are Belong to Us: Understanding the Threats of Instant Apps Based Attacks

Research Papers When: Fri 13 Nov 2020 08:00 - 08:02 People: Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu

… % apps are vulnerable to \textit{link hijacking without STS}, and all instant apps … the proposed hijackings for all the evaluated apps, thus raising the bar against …

Calm Energy Accounting for Multithreaded Java Applications

Research Papers When: Tue 10 Nov 2020 17:33 - 17:34 People: Timur Babakol, Anthony Canino, Khaled Mahmoud, Rachit Saxena, Yu David Liu

… an energy footprint, i.e., the relative energy consumption of all programming …, a specific method, Chappie is total: the energy footprint encompasses all … incurring negligible overhead. In addition, all results are produced with a high …

Evolutionary Improvement of Assertion Oracles

Research Papers When: Fri 13 Nov 2020 08:35 - 08:36 People: Valerio Terragni, Gunel Jahangirova, Paolo Tonella, Mauro Pezze

… Assertion oracles are executable boolean expressions placed inside the program that should pass (return true) for all correct executions and fail (return false) for all incorrect executions. Because designing perfect assertion oracles …

Search-Based Adversarial Testing and Improvement of Constrained Credit Scoring Systems

Research Papers When: Tue 10 Nov 2020 08:37 - 08:38 People: Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boystov, Yves Le Traon, Anne Goujon

… numbers of adversarial data, these are practically useless as they all violate domain-specific constraints. In other words, the generated examples are all

Developing and Evaluating Objective Termination Criteria for Random Testing

Journal First When: Fri 13 Nov 2020 08:05 - 08:06 People: Porfirio Tramontana, Domenico Amalfitano, Nicola Amatucci, Atif Memon, Anna Rita Fasolino

… termination criteria, “All Equivalent” (AEQ) and “All Included in One” (AIO), applicable …

Real world approaches to human-computer collaboration

Plenary events When: Thu 12 Nov 2020 17:00 - 18:00 People: Mira Lane

all know that we must tread intentionally in this new era. Should we aim …

Closing the Gap Between Software Engineering Education and Industrial Needs

Journal First When: Tue 10 Nov 2020 08:03 - 08:04 People: Vahid Garousi, Görkem Giray, Eray Tüzün, Çağatay Çatal, Michael Felderer

… the findings of 33 studies in this area. By doing a meta-analysis of all those …

SOSRepair: Expressive Semantic Search for Real-World Program Repair

Journal First When: Thu 12 Nov 2020 01:35 - 01:36 People: Afsoon Afzal, Manish Motwani, Kathryn Stolee, Yuriy Brun, Claire Le Goues

… %) that pass all independent tests than the prior techniques. We demonstrate a relationship between patch granularity and the ability to produce patches that pass all … SOSRepair to patch 23 (35%) defects, of which 16 (70%) pass all independent tests. We …

MCBAT: A Practical Tool for Model Counting Constraints on Bounded Integer Arrays

Tool Demos When: Fri 13 Nov 2020 01:37 - 01:38 People: Abtin Molavi, Mara Downing, Tommy Schneider, Lucas Bang

… constraints in which all arrays have a finite length. We employ reductions from …

Dynamic Slicing for Deep Neural Networks

Research Papers When: Tue 10 Nov 2020 01:37 - 01:38 People: Ziqi Zhang, Yuanchun Li, Yao Guo, Xiangqun Chen, Yunxin Liu

… protection. In all applications,
NNSlicer significantly outperforms other …

Mining Input Grammars from Dynamic Control Flow

Research Papers When: Thu 12 Nov 2020 08:07 - 08:08 People: Rahul Gopinath, Björn Mathis, Andreas Zeller

… at different locations of the input parser. This works on all stack based recursive …

HISyn: Human Learning-Inspired Natural Language Programming

Research Papers When: Fri 13 Nov 2020 01:32 - 01:34 People: Zifan Nan, Hui Guan, Xipeng Shen

… Natural Language (NL) programming automatically synthesizes code based on inputs expressed in natural language. It has recently received lots of growing interest. Recent solutions however all require many labeled training examples …

PCA: Memory Leak Detection using Partial Call-Path Analysis

Tool Demos When: Fri 13 Nov 2020 01:05 - 01:06 People: Wen Li, Haipeng Cai, Yulei Sui, David Manz

… -flow analyses with a lightweight design. Most of all, it features a partial call …

Establishing Key Performance Indicators for Measuring Software-Development Processes at a Large Organization

Industry Papers When: Wed 11 Nov 2020 17:07 - 17:08 People: Cem Sürücü, Bianying Song, Jacob Krüger, Gunter Saake, Thomas Leich

… be implemented at and accepted by all relevant organizational units. In this paper …

Automatically Identifying Performance Issue Reports with Heuristic Linguistic Patterns

Research Papers When: Tue 10 Nov 2020 17:30 - 17:32 People: Yutong Zhao, Lu Xiao, Pouria Babvey, Lei Sun, Sunny Wong, Angel A. Martinez, Xiao Wang

… Performance issues compromise the response time and resource consumption of a software system. Modern software systems use issue tracking systems to manage all kinds of issue reports, including performance issues.
The problem …

UBITect: A Precise and Scalable Method to Detect Use-before-Initialization Bugs in Linux Kernel

Research Papers When: Fri 13 Nov 2020 01:09 - 01:10 People: Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu

… initialization status along all the possible program execution paths to its uses …

Detecting and Understanding JavaScript Global Identifier Conflicts on the Web

Research Papers When: Tue 10 Nov 2020 01:05 - 01:06 People: Mingxue Zhang, Wei Meng

… JavaScript is widely used for implementing client-side web applications, and it is common to include JavaScript code from many different hosts. However, in a web browser, all the scripts loaded in the same frame share a single global …

Identifying Key Developers using Artifact Traceability Graphs

PROMISE 2020 When: Fri 6 Nov 2020 16:20 - 16:40 People: H. Alperen Çetin, Eray Tüzün

… and connectors. A typical jack (of all trades) has a broad knowledge of the project …

ARDiff: Scaling Program Equivalence Checking via Iterative Abstraction and Refinement of Common Code

Research Papers When: Fri 13 Nov 2020 01:00 - 01:02 People: Sahar Badihi, Faridah Akinotcho, Yi Li, Julia Rubin

… by solving 86% of all equivalent and 55% of non-equivalent cases, compared with 47 …

Docable: Evaluating the Executability of Software Tutorials

Research Papers When: Fri 13 Nov 2020 01:37 - 01:38 People: Samim Mirhosseini, Chris Parnin

… —still yields no tutorial that can successfully execute all steps. We identify …

Heard It through the Gitvine: An Empirical Study of Tool Diffusion across the npm Ecosystem

Research Papers When: Wed 11 Nov 2020 01:09 - 01:10 People: Hemank Lamba, Asher Trockman, Daniel Armanios, Christian Kästner, Heather Miller, Bogdan Vasilescu

… Automation tools like continuous integration services, code coverage reporters, style checkers, dependency managers, etc. are all known to provide significant improvements in developer productivity and software quality. Some of these tools …

Mining Assumptions for Software Components using Machine Learning

Research Papers When: Thu 12 Nov 2020 08:05 - 08:06 People: Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel Briand, David Wolfe

… Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are required to satisfy their requirements …

Selecting Fault Revealing Mutants

Journal First When: Fri 13 Nov 2020 08:11 - 08:12 People: Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon, Koushik Sen

all the existing mutant selection methods, i.e., the random mutant sampling …

Understanding Type Changes in Java

Research Papers When: Fri 13 Nov 2020 01:11 - 01:12 People: Ameya Ketkar, Nikolaos Tsantalis, Danny Dig

… Developers frequently change the type of a program element and update all its references for performance, security, concurrency,library migration, or better maintainability. Despite type changes being a common program transformation …

On the Relationship between Design Discussions and Design Quality: A Case Study of Apache Projects

Research Papers When: Tue 10 Nov 2020 17:05 - 17:06 People: Umme Ayda Mannan, Iftekhar Ahmed, Carlos Jensen, Anita Sarma

… analysis (data mining and a survey of 130 developers) shows that: I) 89.51% of all

Detecting Numerical Bugs in Neural Network Architectures

Research Papers When: Tue 10 Nov 2020 01:35 - 01:36 People: Yuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong, Shing-Chi Cheung, Tao Xie

… on accuracy without losing scalability. DEBAR successfully detects all known …

Unveiling Elite Developers’ Activities in Open Source Projects

Journal First When: Wed 11 Nov 2020 17:12 - 17:14 People: Zhendong Wang, Yang Feng, Yi Wang, James Jones, David Redmiles

all prior research focuses on specific activities and fails to analyze elite …

Community Expectations for Research Artifacts and Evaluation Processes

Research Papers When: Tue 10 Nov 2020 17:03 - 17:04 People: Ben Hermann, Stefan Winter, Janet Siegmund

… processes.
%
\emph{Method.}
We conducted a survey including all members …

Dimensions of Software Configuration: On the Configuration Context in Modern Software Development

Research Papers When: Tue 10 Nov 2020 17:03 - 17:04 People: Norbert Siegmund, Nicolai Ruckel, Janet Siegmund

… among all views, arriving at the conclusion that we need to start considering …

Intelligent REST API Data Fuzzing

Research Papers When: Tue 10 Nov 2020 08:11 - 08:12 People: Patrice Godefroid, Bo-Yuan Huang, Marina Polishchuk

… into 17 unique bugs and reported to Azure developers. All these bugs are reproducible …

Fuzzing: On the Exponential Cost of Vulnerability Discovery

Research Papers When: Tue 10 Nov 2020 08:07 - 08:08 People: Marcel Böhme, Brandon Falk

… \emph{all known bugs} in half the time. Yet, finding linearly \emph{more bugs …

A Taxonomy to Assess and Tailor Risk-based Testing in Recent Testing Standards

Journal First When: Fri 13 Nov 2020 08:30 - 08:32 People: Juergen Grossmann, Michael Felderer, Johannes Viehmann, Ina Schieferdecker

… product as the guiding factor to steer all phases of a test process, i.e., test … of the requirements. However, there are differences between the approaches, and not all

Evaluating Hyper-Parameter Tuning using Random Search in Support Vector Machines for Software Effort Estimation

PROMISE 2020 When: Thu 5 Nov 2020 17:25 - 17:45 People: Leonardo Villalobos-Arias, Christian Quesada-López, Jose Guevara-Coto, Alexandra Martinez, Marcelo Jenkins

… transformation, and SVR was the most effective approach in all studied data sets. Moreover …

Efficient Binary-Level Coverage Analysis

Research Papers When: Fri 13 Nov 2020 08:07 - 08:08 People: M. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz

… instrumentation policies, with different edge-level precision, are used to patch all

Towards transferring Lean Software Startup Practices in Software Engineering Education

Paper Presentations When: Tue 10 Nov 2020 08:11 - 08:12 People: Orges Cico

… \textbf{Context}: In the modern economy, software drives innovation and economic growth. Studies show how software increasingly influences all industry sectors. During the last five decades, software engineering has also changed …

Towards transferring Lean Software Startup Practices in Software Engineering Education

Doctoral Symposium When: Mon 9 Nov 2020 19:00 - 19:30 People: Ján Čegiň, Orges Cico

… \textbf{Context}: In the modern economy, software drives innovation and economic growth. Studies show how software increasingly influences all industry sectors. During the last five decades, software engineering has also changed …

CrFuzz: Fuzzing Multi-purpose Programs through Input Validation

Research Papers When: Tue 10 Nov 2020 08:03 - 08:04 People: Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee

… , all of which are targets of Google's OSS-Fuzz project
and thus heavily …

Precise Learn-to-Rank Fault Localization Using Dynamic and Static Features of Target Programs

Journal First When: Fri 13 Nov 2020 08:37 - 08:38 People: Yunho Kim, SEOKHYEON MUN, Shin Yoo, Moonzoo Kim

… entities. All such information is used by GP to train a ranking model for fault …

How to Mitigate the Incident? An Effective Troubleshooting Guide Recommendation Technique for Online Service Systems

Industry Papers When: Wed 11 Nov 2020 01:05 - 01:06 People: Jiajun Jiang, Weihai Lu, Junjie Chen, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang, Yingfei Xiong, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang

… the distribution and characteristics of TSGs among all incident records in the past two …